Palo Alto Networks has warned its users about 34 vulnerabilities in their products and released four security advisories. They haven’t found any attacks yet, but it’s important for users to update their systems quickly.
Certain Palo Alto products, specifically PAN-OS and GlobalProtect App, are affected by vulnerabilities. Some of these security gaps stem from third-party software, underscoring the interconnected nature of today’s digital ecosystem.
By infosecbulletin
/ Thursday , September 5 2024
CISCO released security updates for two critical security flaws impacting its smart Licensing Utility that could allow unauthenticated, remote attackers...
Read More
By infosecbulletin
/ Wednesday , September 4 2024
OpenBAS is a platform that helps organizations to plan, schedule, and conduct crisis exercises, adversary simulations, and breach simulations. OpenBAS...
Read More
By infosecbulletin
/ Wednesday , September 4 2024
Zyxel has released software updates to fix a serious security issue in certain access point (AP) and security router versions....
Read More
By infosecbulletin
/ Tuesday , September 3 2024
VMware released a security advisory for a major vulnerability in the VMware Fusion product. This vulnerability could be exploited by...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
Indian Computer Emergency Response Team (CERT-IN) issued advisories about multiple vulnerabilities in various Palo Alto Networks applications. Attackers could exploit...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
Malaysia is quickly becoming a leading choice for investing in data centers. It aims to generate RM3.6 billion (US$781 million)...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
US authorities have issued a cybersecurity advisory about a ransomware group called RansomHub. The group is thought to have stolen data...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
There is a new way to attack Atlassian Confluence using the vulnerability CVE-2023-22527. The Confluence Data Center and Server products...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
The Cicada3301 ransomware is made in Rust and attacks Windows and Linux/ESXi hosts. Truesec researchers examined a version that targets...
Read More
By infosecbulletin
/ Tuesday , September 3 2024
Lloyds Bank and Virgin Money's internet banking services were down on Monday, causing trouble for users to access and view...
Read More
Prisma Access Browser Update:
The Prisma Access Browser, based on Chromium, has been updated to version 127.100.2858.4. This update includes fixes for 31 vulnerabilities from four “Chromium” updates between July 16 and August 6.
Of particular concern are CVE-2024-7532 and CVE-2024-6990, labeled as “Critical” by Google. Though Palo Alto assigns these a slightly lower CVSSv4.0 base score of 8.6, they still carry a “High” severity rating, emphasizing the need for swift action.
Cortex XSOAR Patch:
Cortex XSOAR version 1.12.33 fixed a command injection vulnerability (CVE-2024-5914) in the CommonScripts Pack. This flaw has a CVSS score of 7.0 and could allow an attacker to execute arbitrary commands without authentication, potentially compromising the system.
Additional Vulnerabilities Addressed:
The advisories also tackled:
CVE-2024-5916 (CVSS 6):
A fixed vulnerability in PAN-OS and Cloud NGFW versions that unintentionally exposed sensitive data
CVE-2024-5915 (CVSS 5.2):
The GlobalProtect app on Windows has a vulnerability that allows local users to run programs with higher privileges. The issue will be fixed in future app updates.
Call to Action:
Palo Alto Networks advises users to update their systems with the latest patches to protect against potential cyber threats. It’s important to stay proactive in cybersecurity to ensure strong defense.